Description
jshamcrest is vulnerable to regular expression denial of service (ReDoS) when certain types of user input is passed in to the emailAddress validator.
Published: 2018-05-31
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-0364 jshamcrest is vulnerable to regular expression denial of service (ReDoS) when certain types of user input is passed in to the emailAddress validator.
Github GHSA Github GHSA GHSA-xj62-87pg-vcv3 Regular Expression Denial of Service in jshamcrest
References
History

No history.

Subscriptions

Jshamcrest Project Jshamcrest
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2024-09-16T19:50:46.651Z

Reserved: 2017-10-29T00:00:00.000Z

Link: CVE-2016-10521

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-05-31T20:29:00.673

Modified: 2024-11-21T02:44:11.637

Link: CVE-2016-10521

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses